Close

Articles Posted in Information Technology

Updated:

CLLB Information Security Newsletter – Cyber Ethics

September 2009 Volume 2, Issue 9 Cyber Ethics From the Desk of David Badertscher What is Cyber Ethics? Cyber ethics refers to the code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life, with lessons such as “Don’t take what doesn’t belong…

Updated:

The Emerging Field of Electronic Discovery Project Management

By Brett Burney Principal Burney Consultants LLC We are proud to reprint the following article “The Emerging Field of Electronic Discovery Project Management” which first appeared as a TechnoLawyer TechnoFeature exclusive on September 1. It is being reprinted here with the written permission of both the author Brett Burney, a…

Updated:

New on LLRX.Com August 2009

**The Government Domain: Tracking Congress 2.0 http://www.llrx.com/columns/govdomain42.htm With the 111th Congress of the United States reconvening on September 8th, e-gov expert Peggy Garvin highlights new tools and sources that enhance and expand your ability to track and monitor the action. **Re-Hashing the Hash Tag – Crowd Competition and Community Standards…

Updated:

Responding to Real Time Information, Open Systems, and the Obama IT Vision

Change 2010: August 27, 2009, Washington, DC –“The Obama administration has challenged Federal information technology managers to explore more open systems,” said Arpan Patel, Director of Somat’s Information Engineering practice. “Federal managers face a compelling need to understand the differences between traditional approaches to information technology and increasingly important open…

Updated:

U.S. Court of Appeals Judge Stays Microsoft Word Sales Ban

According to a report by Matthew Weigett in the September 4, 2009 Federal Computer Week, the U.S. Court of Appeals in Washington, DC has held that Mircosoft can keep selling its Word software in the United States. Microsoft had filed an emergency motion with the court to stay a ruling…

Updated:

Cybercrime: Rogue Computer Conficker Continues to Counfound Security Experts

The program, known asConficker( http://www.us-cert.gov/cas/techalerts/TA09-088A.html), uses flaws in Windows software to co-opt machines and link them into a virtual computer that can be commanded remotely by its authors. With more than five million of these zombies now under its control government, business and home computers in more than 200 countries…

Updated:

Government, Cookies, and Federal Web Sites – Continued

After posting two articles on this Web site here and here related to the Obama administration seriously considering allowing much greater flexibility regarding the use of cookies and tracking devices on government Web sites, I thought I was finished with the topic. That is until this morning August 25 when…

Updated:

Transparency Chic According to Katherine Mangnu-Ward

In her interesting and provocative article, “Transparency Chic”, Katherine Mangu-Ward, Senior Editor at Reason Magazine, writes: “…Privacy is dead. But one kind of information is still cozily tucked away, the law…[W]ith the possible exception of the ever-leaky CIA, no aspect of government remains more locked down than the secretive, hierarchical…

Updated:

CLLB Information Security Newsletter – Cookies

Volume 2 Number 8 August 2009. From the Desk of David G. Badertscher Mmmm… cookies – chocolate chip and oatmeal with raisins! Cookies are one of the most popular snacks that exist today. Did you know you can get “browser” cookies almost every time you go on the Internet? These…

Contact Us